Releasing Soon

Identity Mesh

Where identities connect.

Unify, synchronize, and govern identities across every system in your environment with watermark-based delta sync and on-premises security.

Delta Sync

Process only what changed with watermark-based change detection (uSNChanged for AD, delta columns for SQL).

Bi-directional Connectors

Seamlessly sync identities in both directions with conflict resolution and authoritative source management.

Policy-based Transforms

Define attribute mappings, transformations, and business rules with a safe transform engine and whitelisted functions.

Audit-ready Reporting

Complete audit trails with before/after values, run history per connector, and a UI-based audit viewer.

How It Works

1

Connect Sources

Connect Active Directory via LDAP and SQL databases using built-in connectors, with more connectors coming soon.

2

Normalize & Transform

Apply attribute mappings, business rules, and governance policies to ensure consistent identity data across all systems.

3

Sync & Audit

Scheduled delta synchronization with complete audit logs and run history for every identity change.

Architecture

Connectors & Agents for all major identity systems

Delta pipeline with real-time change detection

Transform engine with attribute mapping

Policy engine for governance and compliance

Audit log with full history and exports

Identity Mesh High Level Architecture
Download Coming Soon

Enterprise-grade Security

DPAPI-encrypted secrets, TLS for connections

Least privilege access with role-based permissions

On-premises deployment — your data stays in your network

Full audit trails for all identity changes

Comprehensive audit logging with before/after values

RBAC admin console with Windows Negotiate auth

On-Premises Deployment

Identity Mesh runs entirely within your network — your identity data never leaves your infrastructure

Self-Hosted

Windows Service installed via MSI, backed by your own SQL Server database

  • Complete data sovereignty
  • Air-gapped deployment options
  • DPAPI-encrypted secrets and Windows Negotiate auth
  • Admin UI and REST API for configuration

Use Cases

AD ↔ SQL Identity Sync

Synchronize user identities between Active Directory and SQL databases with attribute mapping, transforms, and confidence-based conflict resolution.

M&A Identity Consolidation

Consolidate identities across multiple directories during mergers and acquisitions using anchor-based join rules and projection.

HR → AD Provisioning

Flow employee data from HR databases into Active Directory with transform rules for username generation, group assignment, and attribute normalization.

Governance & Audit

Track every identity change with before/after values, run history per connector, and a comprehensive audit trail for compliance support.

Works with Your Existing Infrastructure

Built-in connectors for Active Directory, SQL, and File (CSV/TXT), with more on the roadmap

Active Directory logo
Active Directory
SQL logo
SQL
File (CSV/TXT)
Coming Soon
Entra ID logo
Entra ID
Coming Soon
Okta logo
Okta
Coming Soon
Workday logo
Workday
Coming Soon
LDAP logo
LDAP
Coming Soon
SCIM logo
SCIM

"Trusted by IAM and security teams"

Leading enterprises rely on Identity Mesh to unify and govern their identity infrastructure across complex, hybrid environments.

FAQ

What systems does Identity Mesh support?
Identity Mesh currently supports Active Directory (via LDAP), SQL databases, and File (CSV/TXT) with built-in connectors. The File connector auto-detects delimiters, headers, and columns with a built-in server file browser. Additional connectors for Entra ID, Okta, Workday, SCIM, and REST APIs are on the roadmap. The IIdentityConnector SDK allows building custom connectors.
Is synchronization real-time or scheduled?
Identity Mesh uses scheduled delta synchronization with watermark-based change detection (uSNChanged for Active Directory, configurable delta columns for SQL). Delta sync processes only changes since the last run, keeping sync cycles fast and efficient.
How do attribute transforms work?
Identity Mesh provides a safe transform engine with whitelisted functions (ToLower, Trim, Replace, Concat, and more). You define attribute mappings and transform scripts through the Admin UI. There is no arbitrary code execution — all transforms use a secure, sandboxed expression evaluator.
How does Identity Mesh handle conflicts?
Identity Mesh uses confidence-based attribute resolution. Each flow rule assigns a confidence score to attribute values, and the highest-confidence value wins when multiple sources contribute to the same attribute. This lets you define clear precedence across connectors.
What audit and reporting capabilities are included?
Every identity change is logged with full audit trails including before/after attribute values, confidence scores, and timestamps. The Admin UI includes an audit viewer and run history per connector for reviewing import/export operations and their outcomes.

Ready to unify your identity fabric?

See how Identity Mesh can transform your identity synchronization and governance.